清晨好,您是今天最早来到科研通的研友!由于当前在线用户较少,发布求助请尽量完整的填写文献信息,科研通机器人24小时在线,伴您科研之路漫漫前行!

A puf-based three-party authentication key establishment scheme for fog-enabled smart home

计算机科学 计算机安全 家庭自动化 认证(法律) 云计算 物联网 雾计算 智能设备 钥匙(锁) 电信 操作系统
作者
Huan Yang,Guo Ya-jun,Yimin Guo
出处
期刊:Pervasive and Mobile Computing [Elsevier]
卷期号:95: 101843-101843 被引量:5
标识
DOI:10.1016/j.pmcj.2023.101843
摘要

With the rise of Internet of Things (IoT), the smart home is another emerging concept and application of IoT, where security and private data of devices are important. In this paper, fog computing is applied to the smart home environment, where fog can provide many smart features and services to the smart home. Fog computing has many advantages, such as low latency and real-time interaction. However, when fog computing is combined with smart home, it also faces some security threats: first, some fog nodes and smart home devices are deployed in public places, vulnerable to damage or theft by attackers, not considered fully trusted, and vulnerable to device loss/theft attacks, impersonation attacks, and message tampering attacks, etc. These threats can lead to adversaries controlling devices in the smart home or modifying messages to make smart home devices execute wrong commands, causing irreparable damage; Second, the smart home system should have good real-time interaction, and the authentication process using the low latency feature of fog computing should not be involved by the cloud. Considering these, it is necessary to design a secure and effective fog-enabled smart home authentication system that is secure against various known attacks, especially when the fog node is not fully trusted or the smart home device is captured as well. Finally, the authentication scheme should also be lightweight due to the limited resources of many smart home devices. To address these issues, this paper proposes a lightweight authentication scheme for the fog-enabled smart home system. It also employs a physical unclonable function to achieve mutual authentication among three parties: smart home devices, fog nodes and users. Formal security analysis under the Real-Or-Random model shows that this scheme is provably secure. And informal security analysis shows that our scheme is robust against various known attacks. At the same time, the proposed scheme requires less computation cost (8.239 ms) and is approximately 40% to 390% faster than existing related schemes. Although the communication cost is slightly higher (4512 bits), it is reasonable because the proposed scheme implements fog/gateway node compromised attack that has not been achieved by any other existing related schemes.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
要减肥的鹰完成签到 ,获得积分10
2秒前
4秒前
doreen完成签到 ,获得积分10
8秒前
10711完成签到,获得积分10
9秒前
Shueason完成签到 ,获得积分10
10秒前
17秒前
勤劳的颤完成签到 ,获得积分10
38秒前
寒战完成签到 ,获得积分10
41秒前
景宛白完成签到,获得积分10
44秒前
maodeshu给zmyzhtx的求助进行了留言
49秒前
长隆完成签到 ,获得积分10
55秒前
Jasper应助科研通管家采纳,获得10
1分钟前
1分钟前
1分钟前
77发布了新的文献求助10
1分钟前
星际舟完成签到,获得积分10
1分钟前
gszy1975发布了新的文献求助10
1分钟前
chen完成签到 ,获得积分10
1分钟前
jlwang完成签到,获得积分10
1分钟前
郑雅柔完成签到 ,获得积分10
1分钟前
luckygirl完成签到 ,获得积分10
1分钟前
2分钟前
草莓熊1215完成签到 ,获得积分10
2分钟前
双黄应助简单的惋庭采纳,获得20
2分钟前
2分钟前
volvoamg发布了新的文献求助10
2分钟前
LELE完成签到 ,获得积分10
2分钟前
maodeshu给clement的求助进行了留言
2分钟前
jyy应助科研通管家采纳,获得10
3分钟前
3分钟前
3分钟前
ff发布了新的文献求助10
3分钟前
3分钟前
ghan完成签到 ,获得积分10
3分钟前
多托郭完成签到 ,获得积分10
3分钟前
3分钟前
lod完成签到,获得积分10
3分钟前
ryan完成签到,获得积分10
3分钟前
ryan发布了新的文献求助10
3分钟前
李爱国应助ff采纳,获得10
3分钟前
高分求助中
Licensing Deals in Pharmaceuticals 2019-2024 3000
Effect of reactor temperature on FCC yield 2000
Very-high-order BVD Schemes Using β-variable THINC Method 1020
錢鍾書楊絳親友書札 800
PraxisRatgeber: Mantiden: Faszinierende Lauerjäger 800
Mission to Mao: Us Intelligence and the Chinese Communists in World War II 600
The Conscience of the Party: Hu Yaobang, China’s Communist Reformer 600
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 基因 遗传学 催化作用 物理化学 免疫学 量子力学 细胞生物学
热门帖子
关注 科研通微信公众号,转发送积分 3298791
求助须知:如何正确求助?哪些是违规求助? 2933763
关于积分的说明 8464860
捐赠科研通 2606953
什么是DOI,文献DOI怎么找? 1423495
科研通“疑难数据库(出版商)”最低求助积分说明 661594
邀请新用户注册赠送积分活动 645188